Coverage in Print Media (Selection)
Here you will find a selection of articles about CrypTool in different print media.
- "The Importance of the Using Software Tools for Learning Modern Cryptography" by Sasa Adamovic, Marko Sarac, Dusan Stamenkovic, and Dalibor Radovanovic in International Journal of Engineering Education, Vol. 34, No. 1, pp. 256–262, 2018
[Abstract: Because of the wide application of cryptographic mechanisms in private and business environments, a cryptography course at many universities has the great importance today. An undergraduate cryptography course is mathematically demanding, and it is quite difficult for students with poor background to follow the course syllabus. This paper presents the use of interactive software in demonstrating basic cryptology principles in modern cryptography.] - "An intelligent PBL-based tutoring system for cryptology domain" by Aleksandar Jevremovic, Sasa Adamovic, Goran Shimic, Marko Sarac, Mladen Veinovic, and Milan Milosavljevic in Proceedings of 4th International Conference on Electrical, Electronics and Computing Engineering, 2017
[Abstract: Teaching cryptology represents one of the most challenging tasks in contemporary engineering education. Apart from setting high requirement for students (i.e. required mathematical knowledge and skills), teachers are also required to invest a lot in each individual student. In the previous paper on this subject matter we presented a CrypTool extension that enables the interconnection of different simulation environments. In this paper, we present an intelligent, problem based learning based tutoring system that is built upon that extension. The system is capable of generating different (level) problems from cryptology domain, developing adequate solutions, evaluating students' solutions and reffering them to appropriate studying materials.] - Mittler Report Verlag, October 2015, page 49 - 52 (German),
"Skalierbare Kryptografie – Verschlüsselung einfach nutzen" - Datenschutz und Datensicherheit (DuD), October 2014, page 701 - 708 (German)
"CrypTool 2.0 – Open-Source Kryptologie für Jedermann"
[The article describes the e-learning software CrypTool 2.0 which was released in August 2014 after 7 years of development and many stable beta versions. CT2 is – like JCT – successor of CT1. CT2 offers a lot of encryption and analysis methods using visual programming as a new GUI. The article also explain the architecture of the software and some sample components.] - Datenschutz und Datensicherheit (DuD), May 2014, page 305-313 (German)
"Sichere E-Mail mit S/MIME Eine Anleitung aus Anwenderperspektive"
[The article exhaustively describes how to install and use secure email with Thunderbird in 4 steps. There is a link to the visualization of S/MIME in CT1. Existing weaknesses concerning the usability are examined. Additionally, the article contains an appeal to foster the existing open-source software in order to get rid off the referred weaknesses to make life of citizens and economy more secure.] - <kes>, March 2014, page 70-77 (German)
"Krypto + NSA = ? -- Kryptografische Folgerungen aus der NSA-Affäre"
[The article investigates: Which crypto systems can -- despite the reveal of the NSA/GCHQ attacks -- still be considered as secure? Where have systems been intentionally weakened? How can we create a secure cryptographic future? Where is the difference between maths and implementation?] - "Security Evaluation and Encryption Efficiency Analysis of RC4 Stream Cipher for Converged Network Applications" by Alaa Riad, Hamdy Elminir, Alaa Shehata, and Taha R. Ibrahim in Journal of Electrical Engineering, Vol. 64, No. 3, 2013, pages 196–200
[Abstract: The trend toward converged networks where voice, IP, video, and wireless are combined over the same network infrastructure offers significant - and highly attractive - benefits. But this union introduces new vulnerabilities and new opportunities to break into the network and so we need converged security.In this paper we investigate the possibility of using RC4 as a stream key generator for converged network applications.
Remark: CT1 is used in Chap. 3.5 Random number visualization analysis.] - Sasa Adamovic, Marko Sarac, Mladen Veinovic, Milan Milosavljevic, and Aleksandar Jevremovic: An Interactive and Collaborative Approach to Teaching Cryptology, 2013, Journal of Educational Technology & Society (Vol. 17, Issue 1)
[Abstract: This paper describes the implementation of a novel module for the CT2 educational software that provides the ability to communicate over the local computer network and the Internet from within CT2. The solution is used to let students interactively and collaboratively work on solving cryptologic problems. The approach tested in the classroom setting was evaluated and leads to better final grades and an increase in students' interest for this area.] - 7th International Conference on Education and Information Systems, Technologies and Applications (EISTA 2012), Reducing the complexity of understanding cryptology using CrypTool, July 2012
[Abstract: Cryptography and cryptanalysis are characterized by a great number of algorithms, parameters, and protocols where at least some of them can be considered as complex mathematical structures. In this paper, electronic learning such as self-regulated learning, computer-based trainings, and learning by doing are presented with the help of a modern e-learning program – CrypTool (CT) – which supports these approaches for developers and users. Additionally, this paper fortifies these claims with an evaluation using the feedback from classes where CT was used to teach cryptographic algorithms. EISTA 2012 was part of the 6th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2012).] - <kes>, May 2012, page 22-27 (German)
"RSA-Sicherheit in der Praxis"
[Investigation, why shared prime factors exist in RSA moduli and how this can be prevented. The program described in the article can be downloaded here.] - digma -- Zeitschrift für Datenrecht und Informationssicherheit, April 2012, Page 32-35 (German)
"E-Learning: Kryptografie und Kryptoanalyse" - 15th Colloquium for infomation Systems Security Education Fairborn, Rong Yang, Layne Wallace, and Ian Burchett: "Teaching Cryptology At All Levels Using CrypTool", June 2011
[Abstract: This paper introduces cryptology in the framework of general cybersecurity and advocates that it is an appropriate mechanism for introducing security issues into the classroom at all level of the curriculum. A practical free software package called CrypTool which can be a major asset in any attempt to teach cryptology to a range of student audiences is presented. Applications and classroom experiences using CrypTool are discussed along with some student feedback.] - Hackin9, IT Security Magazine, March 2011, page 10-14
"The CrypTool project -- The best way, to learn and apply cryptography"
[This article explains the CrypTool project, and introduces the three software versions CrypTool 1.4.30 (CT1), CT2 and JavaCrypTool (JCT).] - <kes>, August 2010, page 6-11 (German)
"Die dunkle Seite der Kryptografie: Kleptografie bei Black-Box-Implementierungen"
[The article contains a 1-page box which introduces JavaCrypTool (JCT), and it contains a screenshot with the according kleptography plugin in JCT.] - PC Plus 297, August 2010, page 65-67
"Breaking the toughest codes"
[The last column describes how to encrypt a message with DES using CrypTool v1] - Datenschutz und Datensicherheit (DuD), March 2009, 7 pages,
"CrypTool – an open source project in practice – Lessons learned from a successful open source project" - <kes>, July 2008, page 62-65 (German)
- DFN News, April 2008, page 28-31
- DFN News, December 2007, page 28-31 (German)
- Information Security - Report 2006 by Touch Briefing, page 21-23
- <kes>, May 2003, page 18-23 (German)
- Datenschutz und Datensicherheit (DuD), October 2002, page 615-618 (German)
- c't, 14/2001, page 204-208 (German)
The remarks in brackets above are taken from the article summary or they describe the link to CrypTool.
For further information see Links / Books.